Sciweavers

54 search results - page 5 / 11
» Efficient Protocols for Set Membership and Range Proofs
Sort
View
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
15 years 10 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
ISCIS
2003
Springer
15 years 2 months ago
Transport Protocol Mechanisms for Wireless Networking: A Review and Comparative Simulation Study
Increasing popularity of wireless services has triggered the need for efficient wireless transport mechanisms. TCP, being the reliable transport level protocol widely used in wired...
Alper Kanak, Öznur Özkasap
EUROCRYPT
2000
Springer
15 years 1 months ago
Fair Encryption of RSA Keys
Cryptography is more and more concerned with elaborate protocols involving many participants. In some cases, it is crucial to be sure that players behave fairly especially when the...
Guillaume Poupard, Jacques Stern
CSFW
2009
IEEE
15 years 1 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
ASIACRYPT
2008
Springer
14 years 11 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger